Download presentation
Presentation is loading. Please wait.
Published bySharlene Lloyd Modified over 9 years ago
2
Natalie De Koker, Lindsay Haley, Jordan Lunda, Matty Ott
3
Virtual Private Networks
4
PPTP VPNs Point-to-Point Tunneling Protocol (PPTP) – PPTP uses a control channel over TCP – PPTP was the first VPN protocol that was supported by Microsoft Dial-up Networking – Many security vulnerabilities found; no longer recommended by Microsoft
5
L2TP & SSL VPN’s Layer 2 Tunneling Protocol (L2TP) – VPN Concentrator (LAC) – LNS – Site-to-site VPN connection – Uses IPSec for security of connection
6
L2TP & SSL VPN’s SSL VPNs – Other options than PPTP and L2TP. OpenVPN Pure IPSec connections are possible. – Security encoded directly into application
7
Virtual LANs Security CamerasUsers Printers VoIP Phones
8
Virtual LANs Users Printers Security Cams Phones
9
Virtual LANs
10
Trunk port Trunking Sw-1 Sw-2 Router Trunk
11
Virtual Trunk Protocol (VTP) Trunking Sw-1Sw-4 Sw-2 Sw-3
12
Configuring a VLAN-capable Switch Managed Switch
13
Configuring a VLAN-capable Switch
14
InterVLAN Routing Mr. Roger’s House, VLAN 100 Neighborhood of Make-Believe, VLAN 101
15
Multilayer Switches Load Balancing QoS and Traffic Shaping Network Protection
16
Load Balancing
17
Multilayer Switch Using a multilayer or content switch –Content Switch
18
QoS & Traffic Shaping Quality of service (QoS) Traffic Shaping
19
Network Protection Intrusion Detection/Prevention –Intrusion Detection System (IDS) –Intrusion Prevention System (IPS) Port Mirroring Proxy Servers Port Authentication
20
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.